Skip to content

Commit 5080075

Browse files
committed
Merge branch 'master' of github.com:rubysec/ruby-advisory-db
2 parents 145ca2c + 9da26fc commit 5080075

File tree

5 files changed

+73
-5
lines changed

5 files changed

+73
-5
lines changed

README.md

+3-5
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ the advisories [CVE] identifier number.
1313
rails/:
1414
2012-1098.yml 2012-2660.yml 2012-2661.yml 2012-3463.yml
1515

16+
If an advisory does not yet have a [CVE], [requesting a CVE][1] is easy.
1617
## Format
1718

1819
Each advisory file contains the advisory information in [YAML] format:
@@ -50,11 +51,6 @@ Each advisory file contains the advisory information in [YAML] format:
5051
* `patched_versions` \[Array\<String\>\]: The version requirements for the
5152
patched versions of the Ruby library.
5253

53-
## Obtaining a CVE
54-
55-
If you have prepared an advisory but do not have a CVE, simply email
56-
57-
5854
## Credits
5955

6056
* [Postmodern](https://github.com/postmodern/)
@@ -64,3 +60,5 @@ If you have prepared an advisory but do not have a CVE, simply email
6460
[CVE]: http://cve.mitre.org/
6561
[CVSSv2]: http://www.first.org/cvss/cvss-guide.html
6662
[YAML]: http://www.yaml.org/
63+
64+
[1]: http://people.redhat.com/kseifrie/CVE-OpenSource-Request-HOWTO.html

gems/devise/2013-0233.yml

+19
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
gem: devise
3+
cve: 2013-0233
4+
url: http://osvdb.org/show/osvdb/89642
5+
title: |
6+
Devise Database Type Conversion Crafted Request Parsing Security Bypass
7+
8+
description: |
9+
Devise contains a flaw that is triggered during when a type conversion error
10+
occurs during the parsing of a malformed request. With a specially crafted
11+
request, a remote attacker can bypass security restrictions.
12+
13+
cvss_v2: 10.0
14+
15+
patched_versions:
16+
- ~> 1.5.4
17+
- ~> 2.0.5
18+
- ~> 2.1.3
19+
- ">= 2.2.3"

gems/gtk2/2007-6183.yml

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
gem: gtk2
3+
cve: 2007-6183
4+
url: http://osvdb.org/show/osvdb/40774
5+
title: |
6+
Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new() Function
7+
Format String
8+
9+
description: |
10+
Format string vulnerability in the mdiag_initialize function in
11+
gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and
12+
SVN versions before 20071127, allows context-dependent attackers to execute
13+
arbitrary code via format string specifiers in the message parameter.
14+
15+
cvss_v2: 6.8
16+
17+
patched_versions:
18+
- "> 0.16.0"

gems/multi_xml/2013-0175.yml

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
gem: multi_xml
3+
cve: 2013-0175
4+
url: http://osvdb.org/show/osvdb/89148
5+
title: |
6+
multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution
7+
8+
description: |
9+
The multi_xml Gem for Ruby contains a flaw that is triggered when an error
10+
occurs during the parsing of the 'XML' parameter. With a crafted request
11+
containing arbitrary symbol and yaml types, a remote attacker can execute
12+
arbitrary commands.
13+
14+
patched_versions:
15+
- ">= 0.5.2"

gems/rdoc/2013-0256.yml

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
gem: rdoc
3+
cve: 2013-0256
4+
url: http://www.osvdb.org/show/osvdb/90004
5+
title: RDoc 2.3.0 through 3.12 XSS Exploit
6+
description: |
7+
Doc documentation generated by rdoc 2.3.0 through rdoc 3.12 and prereleases up to rdoc 4.0.0.preview2.1 are vulnerable to an XSS exploit. This exploit may lead to cookie disclosure to third parties.
8+
9+
The exploit exists in darkfish.js which is copied from the RDoc install location to the generated documentation.
10+
11+
RDoc is a static documentation generation tool. Patching the library itself is insufficient to correct this exploit.
12+
13+
This exploit was discovered by Evgeny Ermakov <[email protected]>.
14+
cvss_v2: 4.3
15+
patched_versions:
16+
- ~> 3.9.5
17+
- ~> 3.12.1
18+
- ">= 4.0"

0 commit comments

Comments
 (0)